Vonage fraud protection with network API and generative AI | Amazon Web Services

Amazon Web Services
11 Jul 202410:19

Summary

TLDRThe video script introduces Fraud Defender, a solution by Vonage, which leverages AWS AI and generative AI to combat identity theft and telecommunications fraud. It discusses challenges faced by organizations and details a cloud-native, serverless architecture that enhances security without adding user friction. The system uses Amazon Bedrock for feedback on transactions, silent authentication, and Amazon Recognition for facial verification, integrating network APIs for real-time insights to protect against fraud while making the authentication process smarter and more secure.

Takeaways

  • 🌟 Vonage is partnering with AWS to introduce Fraud Defender, an innovative solution leveraging AWS AI/ML and generative AI technologies.
  • 🛡️ The primary goal of Fraud Defender is to tackle challenges in identity theft, account takeover, and telecommunications fraud within the financial sector.
  • 💡 Vonage's solution uses a cloud-native, serverless architecture deployed on AWS, offering customization and ease of purchase through the AWS Marketplace.
  • 🔍 Fraud protection is enhanced by real-time network insights provided by Vonage's APIs, which are based on the Camara Network APIs.
  • 🤖 Amazon Bedrock, a generative AI and large language model (LLM), is utilized to analyze transactions and provide feedback on their legitimacy.
  • 🔄 The system creates a feedback loop, using insights from Amazon Bedrock to refine Fraud Defender's responses to fraudulent activities.
  • 📞 Phone number verification is a key component, checking against Fraud Defender's knowledge base to identify potentially fraudulent numbers.
  • 📍 Device location verification ensures that the user's claimed location matches the actual location data from telecom networks, adding a layer of security.
  • 🔑 Silent authentication offers a secure method to replace one-time passwords, reducing the risk of social engineering attacks.
  • 👤 Amazon Recognition uses facial recognition for user authentication, including a liveness check to prevent the use of stolen photos or videos.
  • 🔄 The integration of generative AI allows for continuous improvement of security measures, adapting to new threats and maintaining an optimal balance between user convenience and fraud prevention.

Q & A

  • What is the role of Chad Hrin in the context of the script?

    -Chad Hrin is the Principal Solutions Architect with AWS, focusing on Communications as a Service (CaaS) and generative AI. He introduces the partnership with Vonage and their solution, Fraud Defender.

  • What is Vonage known for in the context of the script?

    -Vonage is known for being an innovative and progressive partner that offers Communication Platform as a Service (CPaaS) solutions and has developed Fraud Defender, a solution that leverages AWS AI and ML technologies.

  • What challenges does Vonage's Fraud Protection Solution address?

    -The solution addresses challenges related to identity theft, account takeover, and telecommunications fraud, which can result in financial losses and brand damage for organizations.

  • What is the significance of generative AI in the Fraud Defender solution?

    -Generative AI plays a crucial role in Fraud Defender by providing real-time insights and feedback on transactions, helping to identify fraudulent activities and improve the system's response to such threats over time.

  • How does the architecture of the Fraud Defender solution benefit customers?

    -The architecture is cloud-native and serverless, deployed on AWS, allowing customers to purchase through the AWS Marketplace and benefit from its customization and advantages.

  • What is Amazon Bedrock, and how does it relate to Fraud Defender?

    -Amazon Bedrock is a generative AI and large language model (LLM) that provides feedback on transactions to determine if they were fraudulent. This feedback is used to enhance Fraud Defender's capabilities.

  • What is the purpose of the silent authentication process in Fraud Defender?

    -Silent authentication is a secure process that can replace one-time passwords, preventing social engineering and providing a better guarantee of the phone line used for user authentication.

  • How does Amazon Recognition contribute to the user authentication process?

    -Amazon Recognition contributes by performing user authentication based on facial recognition, including a liveness check to prevent fraudsters from using stolen photos or videos for authentication.

  • What are the three Network APIs mentioned in the script, and what do they provide?

    -The three Network APIs are number verification, SIM swap, and verify location. They provide real-time insights into the telecommunications network, helping to identify fraudulent activities.

  • How does the Fraud Defender solution reduce user friction while increasing security?

    -By using mechanisms like silent authentication and facial recognition, Fraud Defender reduces user friction while increasing security only when necessary, based on insights indicating a potential fraudulent attempt.

  • What is the long-term impact of using generative AI in Fraud Defender?

    -The use of generative AI in Fraud Defender allows the system to become smarter, more intelligent, and more predictive over time, leading to increased security and fine-tuned parameters that match the perceived risk on the network.

Outlines

00:00

🤖 Introduction to Vonage's Fraud Defender

The first paragraph introduces Chad Hrin, an AWS principal solutions architect, who focuses on Communications as a Service (CaaS) and generative AI. He presents Vonage, a partner of AWS, and their innovative solution called Fraud Defender. Vonage offers a Communication Platform as a Service (CPaaS) and uses AWS AI and ML to combat fraud. The paragraph also introduces Bort from Vonage, who will walk through the value of this industry-first solution, addressing challenges in identity theft, account takeover, and telecommunications fraud. The solution aims to protect organizations from financial losses and brand damage caused by these fraudulent activities.

05:00

🛡️ Architecture and Capabilities of Fraud Defender

The second paragraph delves into the architecture of Vonage's Fraud Defender, which is a cloud-native, serverless solution deployed on AWS. Customers can purchase it through the AWS Marketplace and benefit from its customizable nature. The architecture includes an application for user interaction with financial services, an application backend, and a suite of APIs based on the Camara Network. These APIs provide real-time insights to identify fraudulent transactions or authentication processes. The collected data feeds into Amazon Bedrock, a generative AI and ML model, which provides feedback on transactions to enhance Fraud Defender's capabilities. The system closes the loop between real-time events and the system's response to fraudulent attacks, ensuring both security and user accessibility.

10:02

🚀 Enhancing Security with Network APIs and AI

The final paragraph discusses the advanced features of Fraud Defender, including network APIs for number verification, SIM swap checks, and location verification. These APIs provide real-time insights that enhance the system's ability to detect fraud. The paragraph also highlights silent authentication and facial recognition via Amazon Recognition, which improve security while reducing user friction. The generative AI component of Fraud Defender learns from insights to increase security over time, fine-tuning parameters to match the perceived risk on the network. The partnership with AWS and the integration of network APIs and AI make Fraud Defender a cutting-edge solution in the marketplace, setting the stage for future innovations.

Mindmap

Keywords

💡AWS

AWS stands for Amazon Web Services, which is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments. In the video's context, AWS is highlighted as the platform where Vonage's Fraud Defender solution is deployed, showcasing the integration of AWS's AI and ML capabilities within the solution.

💡Communications as a Service (CaaS)

Communications as a Service refers to the delivery of communication services over the internet, allowing businesses to use these services without the need for on-premises hardware. In the script, Chad Hrin mentions his focus on CaaS, indicating the importance of cloud-based communication services in the development of innovative solutions like Fraud Defender.

💡Generative AI

Generative AI refers to artificial intelligence systems that can generate new content, such as text, images, or audio, based on existing data. The video discusses how Vonage's Fraud Defender leverages generative AI, particularly through Amazon Bedrock, to analyze transactions and improve fraud detection capabilities.

💡Fraud Defender

Fraud Defender is a solution offered by Vonage that focuses on combating fraud and identity theft within communication platforms. The script emphasizes how Fraud Defender integrates with AWS services and uses AI to protect against fraudulent activities, such as account takeover and telecommunications fraud.

💡Identity Theft

Identity theft is the unauthorized use of someone's personal identifying information, often to commit fraud. The video script discusses how organizations face challenges with identity theft, and how Fraud Defender helps in mitigating such risks by combining telecommunications capabilities with AI to detect and prevent unauthorized access to customer accounts.

💡Account Takeover

Account takeover refers to a type of cyber attack where a fraudster gains control over a user's account, often leading to financial losses and brand damage. The script mentions account takeover as a significant challenge that Fraud Defender addresses by using real-time network insights and AI to identify and prevent such attacks.

💡Telecommunications Fraud

Telecommunications fraud involves the misuse of telecommunication services, such as phone lines or text messages, to commit fraud. The script explains how Fraud Defender helps protect against this by detecting fraudulent use of verification processes and preventing financial exploitation.

💡Cloud Native and Serverless Architecture

A cloud-native and serverless architecture refers to a system designed to run on cloud services, without the need for managing servers. The script describes the architecture of Fraud Defender as being cloud-native and serverless, deployed on AWS, which allows for scalability, flexibility, and ease of customization.

💡Amazon Bedrock

Amazon Bedrock, as mentioned in the script, is a generative AI and large language model (LLM) that provides feedback on transactions to determine if they are fraudulent. It is part of the Fraud Defender solution's architecture, enhancing the system's ability to learn and adapt to new fraud patterns.

💡Silent Authentication

Silent authentication is a security process that verifies the identity of a user without their active participation, often using behavioral biometrics or other passive methods. The script highlights silent authentication as a feature of Fraud Defender that increases security by replacing one-time passwords and preventing social engineering attacks.

💡Amazon Recognition

Amazon Recognition is a service that provides user authentication through facial recognition, including a liveness check to ensure the authenticity of the user. The script discusses how Amazon Recognition is integrated into Fraud Defender to add an extra layer of security, making it harder for fraudsters to use stolen photos or videos for authentication.

Highlights

Introduction of Chad Hrin, Principal Solutions Architect with AWS, focusing on Communications as a Service (CX) and generative AI.

Vonage, an innovative partner, introduces Fraud Defender, a solution leveraging AWS AI/ML and generative AI.

Fraud Defender addresses challenges in identity theft and account takeover in the financial sector.

Telecommunications fraud prevention, protecting against fraudulent verification processes.

The architecture of Fraud Defender is cloud-native and serverless, deployed on AWS.

Customers can purchase Fraud Defender through AWS Marketplace for easy customization.

Real-time network insights are provided by Vonage APIs based on the Camara Network APIs.

Amazon Bedrock, a generative AI and LLM model, is used for transaction feedback to identify fraud.

Fraud Defender uses feedback to close the loop on real-time fraudulent attack responses.

Multi-layer fraud detection process including phone number verification and telecom network checks.

Sim swap checks to prevent telecom fraud and account takeover attempts.

Silent authentication as a secure process replacing one-time passwords and preventing social engineering.

Device location verification using real-time network information to ensure user location authenticity.

Amazon Recognition for user authentication with facial recognition and liveliness checks.

Network APIs discussed include number verification, Sim Swap, and verify location.

Fraud protection increases without adding user friction through mechanisms like silent authentication.

Amazon Recognition and generative AI enhance product intelligence, security, and predictive capabilities.

Fraud Defender's generative AI closes the loop between authentication and fraudulent activities, improving security over time.

The partnership between Vonage and AWS embarks on an innovative journey in the marketplace with Fraud Defender.

Transcripts

play00:00

hi Chad hrin principal Solutions

play00:01

architect with AWS I focus on

play00:04

Communications as a service CX and

play00:07

generative AI today I'm proud to

play00:09

introduce our partner Vonage who's a

play00:11

very Innovative Progressive partner

play00:13

focusing on a solution called fraud

play00:16

Defender Vonage offers communication

play00:18

platform as a service solutions and

play00:21

fraud Defender is actually taking

play00:23

advantage of a lot of AWS AIML and

play00:26

generative AI Solutions today you'll see

play00:29

those moving parts and the architecture

play00:31

how it comes together I'll turn it over

play00:33

to the Vonage team hi my name is bort

play00:36

from Vonage part of Ericson and we're

play00:39

here today to walk through to the the

play00:42

value that we're bringing as this

play00:44

incredible Innovative and actually

play00:46

industry first type of solution and so I

play00:49

think what would be great is Mory if you

play00:51

could help us with starting off with

play00:54

what are the challenges that we have

play00:55

within our

play00:56

Marketplace yeah thank you Courtney my

play00:58

name is morsey Chu I'm director of

play01:00

global alliances at Vonage and the

play01:04

Vonage fraud protection solution

play01:07

actually addresses a large number of

play01:09

challenges that organizations encounter

play01:11

in terms of Fraud and fraud protection

play01:14

as a first step CH organizations are

play01:18

encountering challenges in terms of

play01:20

identity theft and in terms of account

play01:23

takeover this means that frosters today

play01:26

are capable of combining separate

play01:28

Technologies including

play01:29

telecommunications capabilities in order

play01:32

to hack and social engineer into

play01:34

customer accounts when a type of attack

play01:38

like account takeover happens this

play01:40

causes usually a lot of financial losses

play01:43

for the customer and it provokes also uh

play01:47

uh brand damage to the

play01:50

organization we also help organization

play01:52

to protect themselves from

play01:54

telecommunications fraud which is which

play01:57

happens when a frauders try to abuse use

play02:00

actually for example verification

play02:02

processes to benefit uh their Financial

play02:05

Health so this is the number of

play02:08

challenges that we encounter

play02:10

today but I think what's really

play02:12

important that we want to highlight here

play02:14

is as we take this approach with the

play02:17

generative AI as well as the partnership

play02:20

that we have with our Vonage team here

play02:22

is it's really about how we're

play02:23

protecting against the fraud and

play02:25

identity fraud that's happening and how

play02:28

that then connects with network apis our

play02:31

Sim swap even our Cass Solutions and

play02:35

then how it then progresses into account

play02:38

takeover which is really very

play02:40

Troublesome for not only the consumer

play02:42

but also businesses fintech in

play02:45

particular and then finally how this is

play02:48

going to really help in curbing the

play02:51

financial losses that are being seen

play02:53

right now with fraudulent activities

play02:55

that are happening every day constantly

play02:59

so why don't we go into taking a look at

play03:01

the architecture absolutely so the

play03:04

architecture as you can see is a

play03:06

completely Cloud native and serverless

play03:08

architecture that is deployed on AWS

play03:11

customers can purchase this through the

play03:12

AWS Marketplace and they can benefit

play03:15

from all the advantages of this solution

play03:18

and it is easily customizable what we

play03:20

can see in the architecture is a number

play03:23

of components first of all there is the

play03:25

application which is basically the

play03:27

vehicle through which the uh user

play03:30

interacts with the banking services or

play03:32

with the financial institution there's

play03:35

the application back end which is

play03:37

located here and then we find the Vonage

play03:39

fraud protection Suite of apis so these

play03:42

apis are based on the Camara Network

play03:45

apis and what they uh what they enable

play03:48

to do is to get realtime insights about

play03:51

what is happening on the network with

play03:54

these insights we collect data that can

play03:57

help us identify whether a transaction

play04:01

or an authentication process is

play04:02

fraudulent or not and so the information

play04:06

that we collect we is also uh fed into

play04:10

Amazon Bedrock Amazon Bedrock is a

play04:12

generative Ai and llm model that allows

play04:16

us basically to have uh a feedback on

play04:19

those transactions and whether those

play04:21

transactions were uh actually fraudulent

play04:24

or not and then we use the feedback from

play04:27

Amazon bedrock in order to feed our

play04:30

fraud Defender and that allows to close

play04:33

the loop between what is happening in

play04:35

real time and how the system should

play04:37

respond to fraudulent attacks or in the

play04:40

other um uh better case where the user

play04:43

is legitimate and therefore Grant access

play04:45

to that user so what we can see here is

play04:49

the full process that starts by the user

play04:52

asking to register or to authenticate to

play04:55

for example a banking application there

play04:58

are multiple steps that happen all of

play05:00

this happened in a number of mult 100

play05:03

milliseconds but the process is actually

play05:08

uh behind it is actually uh a

play05:10

multi-layer approach of you know making

play05:13

checks about the fraud about the

play05:15

fraudulent capabilities and fraudulent

play05:17

insights for example when a user tries

play05:20

to connect and Supply their email

play05:22

address password and uh their phone

play05:25

number we start checking whether this

play05:27

phone number is a fraudulent number

play05:29

based on the fraud Defender uh knowledge

play05:32

base um and then we can um move on with

play05:36

checking other databases and other

play05:38

Telecom Network as well so the csps also

play05:41

have information about that we combine

play05:43

all of this so that the bank has a

play05:46

complete knowledge about that uh

play05:48

fraudulent number we do also Sim swap

play05:50

checks the Sim swap check enables us to

play05:53

say if there is maybe a telecom fraud

play05:56

happening in order to take over the uh

play06:00

uh phone number of the user and that

play06:03

basically can give us information

play06:05

whether a transaction for example like a

play06:07

password reset request is this a

play06:10

legitimate access or is this or is this

play06:12

a fraudster trying to take over an

play06:15

account of a legitimate user we do also

play06:18

silent authentication and Silent

play06:20

authentication is a a very secure

play06:23

process that can replace uh onetime

play06:25

passwords for example it prevents social

play06:28

engineering and at the same time it

play06:29

provides a better guarantee about the

play06:32

phone line that we are using in order to

play06:34

authenticate the user the device

play06:37

location can enable us to verify that

play06:41

the user who is for example connecting

play06:42

to a bank account from a certain country

play06:45

or a certain region is actually also

play06:47

located in that region and this is based

play06:50

on the network information the real-time

play06:53

Network information that the Telecom

play06:55

operator can provide us through the

play06:57

camar network API and finally we can

play07:00

proceed with Amazon recognition Amazon

play07:03

recognition does the user authentication

play07:06

based on facial recognition and this is

play07:09

a powerful process because it has a

play07:11

liveliness check liveliness check is an

play07:14

important piece of the process because

play07:15

froster can now use social media for

play07:18

example to recover photos and videos of

play07:21

the user and try to use that for the

play07:23

authentication process so Mory that

play07:25

means that there's actually three

play07:27

Network apis that we're talking about

play07:29

which is number verification Sim Swap

play07:33

and verify location absolutely so these

play07:35

are network apis that are available

play07:39

today in a certain number of countries

play07:41

and uh they provide us with those

play07:44

real-time insights that otherwise we

play07:46

would not be able to get them uh through

play07:48

the uh telecommunications

play07:50

Network so really what this also does is

play07:54

it takes away the need for the user to

play07:57

have to sit and try to play with a

play07:59

password anymore so what you're saying

play08:01

is is that you don't have to remember

play08:03

your passwords anymore cuz I'm terrible

play08:05

at that and so now this is just

play08:08

automatic yeah absolutely so what is

play08:11

happening with this solution usually

play08:13

when we increase the protection and the

play08:15

the fraud protection in a certain uh

play08:18

workload this usually adds friction to

play08:20

the user and what is happening with this

play08:22

process is exactly the opposite we're

play08:24

increasing the capabilities of frog

play08:26

protection and at the same time with

play08:28

mechanisms like silent authentication

play08:31

and uh facial recognition we actually

play08:33

reduce the friction and we increase the

play08:36

friction only when it is really needed

play08:38

when we have insights that are telling

play08:40

us that this could be a really a

play08:42

fraudulent attempt to take over the

play08:45

account of our legitimate user okay but

play08:48

one final thing which makes I think it

play08:50

really cool is is that this Amazon

play08:54

recognition and the whole generate AI

play08:57

all of a sudden starts making the

play08:59

products even smarter more intelligent

play09:02

more predictive which equals more secure

play09:06

100% in order to do that we have fraud

play09:09

Defender which is a vantage API and a

play09:12

service that helps hundreds of thousands

play09:14

of customers to protect their Network

play09:17

and we use the insights that are coming

play09:19

from fraud Defender to protect our

play09:21

customers and what we do with the

play09:24

generative AI we are capable of closing

play09:26

the loop between the authentication

play09:28

process and fraudulent activities and

play09:31

suspicions and we feed that back to the

play09:33

fraud to fraud Defender and that

play09:35

increases the security over time and

play09:37

also we fine-tune the parameters and we

play09:39

make sure that the level of friction is

play09:42

corresponds exactly to the risk that we

play09:44

are perceiving on the

play09:45

network so again thank you so much for

play09:48

taking the time to be with us and learn

play09:50

about Network apis the value that

play09:53

Network apis and the generate Ai and our

play09:56

partnership that we're we are embarking

play09:58

upon with AWS it's incredibly exciting

play10:02

we have so much that's coming and

play10:04

there's so much more ahead of us but

play10:06

this is just the first big step of

play10:08

something that's incredibly Innovative

play10:11

out there in the marketplace

play10:15

[Music]

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
AWS AIVonageFraud ProtectionCommunication SecurityCloud NativeServerless ArchitectureReal-time InsightsFacial RecognitionTelecom FraudGenerative AICX Innovation
Besoin d'un résumé en anglais ?